Recent trends in high-resolution hard x-ray tomography
|
conference
|
October 2019 |
"How do I fool you?": Manipulating User Trust via Misleading Black Box Explanations
- Lakkaraju, Himabindu; Bastani, Osbert
-
AIES '20: AAAI/ACM Conference on AI, Ethics, and Society, Proceedings of the AAAI/ACM Conference on AI, Ethics, and Society
https://doi.org/10.1145/3375627.3375833
|
conference
|
February 2020 |
Physical unclonable functions
|
journal
|
February 2020 |
A physical zero-knowledge object-comparison system for nuclear warhead verification
|
journal
|
September 2016 |
How to insure that data acquired to verify treaty compliance are trustworthy
|
journal
|
May 1988 |
Measuring the Transmission Matrix in Optics: An Approach to the Study and Control of Light Propagation in Disordered Media
|
journal
|
March 2010 |
A proposed approach for monitoring nuclear warhead dismantlement
|
journal
|
January 2001 |
Physical One-Way Functions
|
journal
|
September 2002 |
Implementation and security analysis of practical quantum secure direct communication
|
journal
|
February 2019 |
Detection of special nuclear material with a transportable active interrogation system
|
journal
|
November 2018 |
Deep speckle correlation: a deep learning approach toward scalable imaging through scattering media
|
journal
|
January 2018 |
Sensor physical unclonable functions
|
conference
|
June 2010 |
Rattling nucleons: New developments in active interrogation of special nuclear material
- Runkle, Robert C.; Chichester, David L.; Thompson, Scott J.
-
Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment, Vol. 663, Issue 1
https://doi.org/10.1016/j.nima.2011.09.052
|
journal
|
January 2012 |
Physical Unclonable Functions for Device Authentication and Secret Key Generation
|
conference
|
June 2007 |
Learning-based imaging through scattering media
|
journal
|
January 2016 |
A Survey of Hardware Trojan Taxonomy and Detection
|
journal
|
January 2010 |
Deferred verification: verifiable declarations of fissile-material stocks for disarmament purposes
|
journal
|
May 2019 |
A zero-knowledge protocol for nuclear warhead verification
|
journal
|
June 2014 |
scikit-image: image processing in Python
|
journal
|
January 2014 |
Spectre Attacks: Exploiting Speculative Execution
|
conference
|
May 2019 |
Generalized optical memory effect
|
journal
|
January 2017 |
New Developments and Applications of Superheated Emulsions: Warhead Verification and Special Nuclear Material Interdiction
|
journal
|
April 2018 |
Sensitivity of the multiple-scattering speckle pattern to the motion of a single scatterer
|
journal
|
April 1991 |
Magnetic resonance imaging of single atoms on a surface
|
journal
|
July 2019 |
Modeling attacks on physical unclonable functions
|
conference
|
January 2010 |
The Landscape of Exascale Research: A Data-Driven Literature Analysis
|
journal
|
July 2020 |
Virtual Proofs of Reality and their Physical Implementation
|
conference
|
May 2015 |
Light fields in complex media: Mesoscopic scattering meets wave control
|
journal
|
March 2017 |
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels
- Genkin, Daniel; Pachmanov, Lev; Pipman, Itamar
-
CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
https://doi.org/10.1145/2976749.2978353
|
conference
|
October 2016 |
Theoretically efficient high-capacity quantum-key-distribution scheme
|
journal
|
February 2002 |
A bubble-damage polymer detector for neutrons
|
journal
|
January 1984 |
Proton range verification with ultrasound imaging using injectable radiation sensitive nanodroplets: a feasibility study
|
journal
|
March 2020 |
Radiation dosimetry and spectrometry with superheated emulsions
|
journal
|
September 2001 |
Quantum cryptography: Public key distribution and coin tossing
|
journal
|
December 2014 |